DPDK Packet Capture (PDUMP)
The 16.07 release of DPDK introduces a new packet capture framework, which will allow users to capture traffic from existing devices/ports/queues and dump the packets to a pcap file...
The 16.07 release of DPDK introduces a new packet capture framework, which will allow users to capture traffic from existing devices/ports/queues and dump the packets to a pcap file...
Data processing and computing power are these days moving into the cloud, which is mainly a virtualized environment with huge flexibility and scalability achieved through a massive infrastructure...
The uptake of Security Information and Event Management (SIEM) technology in large enterprises is nearly ubiquitous. Today, there are very few large companies without a SIEM...
Cyber security attacks are on the rise and lately we have learned about a new major data breach at Yahoo, where they apparently lost some undisclosed information on 500.000.000...
Pokemon Go has taken the world by storm. Nintendo have done it again. Just like the Nintendo Wii changed video game players from couch potatoes into physically active game participants...
When Bob Metcalfe pitched his “Ethernet” vision back in 1972 during his employment at PARC Xerox, I am sure that he, despite his visionary mind set, had no idea of what he had...
The IoT phenomenon is happening as we speak. What is IoT? It’s simple, all the new things we buy can be “connected”. Your smartphone, tablet, computer, etc., can all be connected...
I was recently at the Red Hat Summit in San Francisco. This is the event that today has become synonym with open source solutions, one of the biggest trends to have driven the technology...
Over the last few years, the increase in internet bandwidth has caused carriers to invest in equipment that can meet the requirements of the increasing network traffic. The rapid growth in 100G...
Security prevention has been the predominant philosophy guiding security solutions to date. The premise is that it is possible through defense in depth and multiple layers of security to foil attacks...